The McAfee Labs Threats Report, December 2018 introduces several new threats statistics, such as IoT malware, that represent some of the growing trends in attacks. We also look at how the takedowns of key dark web markets continue to impact cybercriminals and their businesses, and at the hot topics in several underground hacker forums.

This in-depth report analyzes a new data reconnaissance implant targeting Korean-speaking users. The malware reuses a portion of code from the Seasalt implant (circa 2010) that is linked to the Chinese hacking group Comment Crew.

The McAfee Labs Threats Report, September 2018 shows that cybercriminals continue to go where the money is — from coin mining to billing fraud campaigns — refining their tactics to defraud unsuspecting victims.

The McAfee Labs Threats Report, June 2018 examines the growth and trends of new malware, ransomware, and other threats in Q1 2018. The report spotlights evolving attack techniques, cryptocurrency mining, and multisector attacks.

McAfee Labs researchers discuss the background and drivers of threat intelligence sharing. We also examine Mirai, which is notable because it detects and infects poorly secured IoT devices, transforming them into bots to attack its targets.

In a new campaign of targeted ransomware attacks, hackers gained persistent access to the victims' networks through vulnerability exploitation and spread their access to any connected systems that they could.

McAfee commissioned a primary research study to gain a deeper understanding of the ways in which enterprises are using security operations centers, how they have changed over time, and what they will look like in the future. The second Key Topic summarizes the year in ransomware. Not only was there a huge jump in the number of ransomware attacks in 2016 but we saw significant technical advancements, too. We detail some of those advancements in this story. Finally, the third Key Topic digs into Trojans that infect legitimate code and hide out, hoping to go unnoticed as long as possible to maximize payouts. We show how attackers are creating long-lasting, fully undetectable malware.

Business continuity planning is a critical function that involves many different personnel and departments over multiple phases. As with many business continuity programs, an iterative process is most effective in developing a refined set of procedures and plans.

More than one billion Android devices have been activated to date, and it’s estimate that 1.4 million devices are activated per day. The rapidly increasing popularity of this mobile OS demands that developers understand how to create secure Android applications. This white paper focuses on secure coding practices for Android applications.

How familiar are you with low-hanging fruit — the easiest ways for attackers to gain entry to your network and potentially run off with your valuable data? This white paper explores penetration tests that you can perform at your organization to gain an understanding of how to apply the proper defenses to prevent exploitation of the top five low-hanging fruit.

Enterprise messaging systems (EMS) are highly reliable, flexible, and scalable systems that allow asynchronous message processing between two or more applications. This paper provides guidance on penetration testing techniques to assess the security of ActiveMQ-based EMS written using the Java Message Service API.